Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...
Web services have greatly leveraged the world of Business-to-Business (B2B) communication and promise a lot more through dynamic service composition. In order to compose Web servi...
With the near ubiquity of mobile phones, people are reachable almost anywhere and at any time. The convenience this provides for people to more effectively combine different aspec...
This paper presents an agent-based educational environment to teach argument analysis (ALES). The idea is based on the Argumentation Interchange Format Ontology (AIF) using "W...
The quality of information is crucial for decision making in many mission-critical applications such as battlefield operations and intelligence analysis. However, as the system b...
Bin Yu, Srikanth Kallurkar, Ganesh Vaidyanathan, D...